Don’t Use Internet Explorer

Here’s the latest implied message from Microsoft to its valued clients: “Don’t use Internet Explorer”. Support is ending for Internet Explorer versions 8, 9 and 10. It has been suggested that users switch over to Microsoft’s newest Edge browser. There is, of course, the option of switching over to Internet Explorer 11 if you absolutely feel compelled to stick with the browser, though …

TOR Announces Bug Bounty Program

In a somewhat revolutionary step, the non-profit organization responsible for TOR has announced what they call the ‘Bug Bounty Program.’ As the largest, most popular tool designed to grant anonymity online; it comes as no surprise that cyber security is a huge part of the functioning of the TOR network. The Bug Bounty Program, in a nutshell, is an incentive …

MacKeeper Antivirus Hacked

Recently Internet users were treated to some disturbing online posts that covered the disastrous hacking of MacKeeper Antivirus – exposing 21 GB of data and 13 million users’ personal information. The extent of the potential damage caused by the exposure is almost unlimited, with password hashes, phone numbers, IP addresses among the leaked information. MacKeeper Antivirus is marketed as software that …

Attack on the Internet DNS

During the early stages of last week, two separate attacks were carried out against the Internet’s DNS Root Servers, by the same person. The first of these Distributed Denial of Service (DDoS) attacks occurred on the last day of November and lasted 160 minutes while the next day, the second attack lasted almost an hour. There are 13 of these …

Linux Ransomware: Newest Hacking Trend

In an article recently posted on The Hacker News, readers are informed of the fact that Linux Ransomware is one of the biggest malware trends at this time. Essentially, Linux Ransomware enables hackers to access a user’s hard drive, encrypt its contents, and demand that the user pay a hefty ransom in exchange for the all-important data. More often than …